Just came up with it. It requires weak point analysis.
0. Alice creates alice.txt file with ‘scissors’ text in it
1. Alice zips alice.txt with password Apass as alice.zip
2. Alice sends out alice.zip to Bob
3. Bob produces bob.txt file with ‘paper’ text in it
4. Bob zips bob.txt and alice.zip with password Bpass as bob.zip
5. Bob sends out bob.zip back to Alice
6. They share their passwords over chat and unzip both zip files
7. Alice wins.